The Heart Attack Detection System and Reporting over Web Sever using Arduino Mega & Node MCU
نویسندگان
چکیده
منابع مشابه
Web Attack Detection Using ID
Decision tree learning algorithms have been successfully used in knowledge discovery. They use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring decision tree rules. This paper reports on the use of ID3 to Web attack detection. Even though simple, ID3 is sufficient to put apart a number of Web attacks, including a large proportion of ...
متن کاملWeb Attack Detection Using ID3
Decision tree learning algorithms have been successfully used in knowledge discovery. They use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring decision tree rules. This paper reports on the use of ID3 to Web attack detection. Even though simple, ID3 is su cient to put apart a number of Web attacks, including a large proportion of th...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملIMPROVE THE RECOMMENDER SYSTEM USING SEMANTIC WEB
To buy his/her necessities such as books, movies, CD, music, etc., one always trusts others’ oral and written consultations and offers and include them in his/her decisions. Nowadays, regarding the progress of technologies and development of e-business in websites, a new age of digital life has been commenced with the Recommender systems. The most important objectives of these systems include a...
متن کاملClone Attack Detection in MWSN Using Neighbor Node Information
Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2020
ISSN: 2321-9653
DOI: 10.22214/ijraset.2020.30331